Open Source


9 Best Open Source Network Monitoring Tools

Network monitoring is a critical component of your network management strategy that provides valuable insights into network-related problems which can affect your organization. When you monitor networks regularly, you'll mitigate risks like overloaded networks, router problems, downtime, cybercrime, and data loss. Network monitoring lets you: All successful companies invest in network monitoring tools that provide accurate insights into performance, speed, security, and productivity.


CloudRadar launches free open-source remote management suite for any OS and IoT

CloudRadar has launched a new all-in-one remote management suite. Manage Windows, Linux, desktops and servers, and any IoT device from one central console. Securely log into remote systems behind firewalls and without fixed IP addresses. Access any device via an intuitive user interface from your browser - from your desktop or smartphone. Claim full control over your remote management - without sharing your credentials with external companies.

Algorithmia and MLflow: Integrating open-source tooling with enterprise MLOps

We’re excited to share our new integration with MLflow, a popular open-source platform for managing various stages of the ML lifecycle. With this new integration, you can build and train your models using MLflow, then deploy them to production with Algorithmia where you can use our advanced features for enterprise ML operations and governance.

Choosing Open Wisely

Since Snowflake’s inception we’ve had the needs of our customers as our North Star, with a clear focus on security and governance of data, continuous advances on performance and reduction of latencies, and relentless capabilities innovation. As part of our product development, we constantly evaluate where open standards, open formats, and open source can help or hinder our progress towards those goals. In short, it is a matter of degree.


Building a Go-to-Market Strategy for Developer Tools

As a YC alum and co-founder of Mattermost, I often get asked by early stage YC companies about what it’s like to build a commercial open source business. With the start-up’s permission, we’ve started recording some of the Q&A sessions, transcribing them and sharing the more popular questions on the Mattermost blog in short form articles.


How We've Built an Open Source Community at Mattermost

Our community has been at the heart of what makes Mattermost great since the earliest days. The first community members were people who were trying out the earliest versions of the platform, filing bugs and wanting to make feature improvements. Our open source community has grown, contributing thousands of pull requests, from new features and plugins to translations and documentation.


Open Source Confessions From a Proprietary Software User

Sometimes I feel like I’m in my first Open Source Anonymous meeting. Hi, my name is Chris Lentricchia, and I haven’t used open source software for six months. I’m 27, and Instana is my first proprietary software company. After working my entire career in open source, it’s pretty surreal. I started at Red Hat, which was also “born” in 1993, where I oversaw an array of technologies, from Linux to management software and middleware.


Free log management doesn't mean cheaper: the true cost of open source vs. commercial license

When meeting with people who are evaluating log management solutions, I often hear the same question: Why should I pay for Humio when I can get open-source software like Elasticsearch for free? It’s a fair question. Unfortunately, while open-source solutions look cheaper initially, they come with hidden costs and even greater business risk. Let’s look at three often-overlooked issues that increase the cost of open-source log management.


Get earlier, actionable vulnerability insights from Black Duck Security Advisories

The number of open source vulnerabilities discovered each year never seems to stop growing, emphasizing the importance of developers addressing them quickly and efficiently. However, simply identifying vulnerabilities is insufficient; their sheer scale makes it necessary to have an intelligent way of understanding which ones need to be fixed first to decrease the risk of a breach. For development teams in this environment, remediation prioritization and broad vulnerability coverage are critical.